From 8ce5944ef26b35f80e2045b30b4174828456fa42 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 22 Nov 2022 03:20:17 +0900 Subject: [PATCH] Auto Update 2022/11/21 18:20:17 --- 1999/CVE-1999-1053.json | 2 +- 2010/CVE-2010-4804.json | 4 ++-- 2015/CVE-2015-6639.json | 8 ++++---- 2016/CVE-2016-2431.json | 8 ++++---- 2016/CVE-2016-5195.json | 8 ++++---- 2017/CVE-2017-10271.json | 8 ++++---- 2017/CVE-2017-5638.json | 8 ++++---- 2017/CVE-2017-9841.json | 29 +++++++++++++++++++++++++++++ 2018/CVE-2018-8021.json | 8 ++++---- 2018/CVE-2018-8897.json | 2 +- 2019/CVE-2019-0708.json | 8 ++++---- 2019/CVE-2019-15126.json | 8 ++++---- 2019/CVE-2019-2725.json | 8 ++++---- 2020/CVE-2020-10558.json | 4 ++-- 2020/CVE-2020-1472.json | 12 ++++++------ 2020/CVE-2020-14883.json | 4 ++-- 2021/CVE-2021-1961.json | 8 ++++---- 2021/CVE-2021-21551.json | 20 ++++++++++---------- 2021/CVE-2021-21972.json | 8 ++++---- 2021/CVE-2021-22205.json | 8 ++++---- 2021/CVE-2021-25646.json | 4 ++-- 2021/CVE-2021-26855.json | 8 ++++---- 2021/CVE-2021-3129.json | 4 ++-- 2021/CVE-2021-3156.json | 8 ++++---- 2021/CVE-2021-36934.json | 8 ++++---- 2021/CVE-2021-41773.json | 13 +++++++------ 2021/CVE-2021-42013.json | 5 +++-- 2021/CVE-2021-42278.json | 8 ++++---- 2021/CVE-2021-44228.json | 24 ++++++++++++------------ 2022/CVE-2022-21999.json | 8 ++++---- 2022/CVE-2022-22954.json | 8 ++++---- 2022/CVE-2022-24637.json | 4 ++-- 2022/CVE-2022-2588.json | 8 ++++---- 2022/CVE-2022-26134.json | 8 ++++---- 2022/CVE-2022-29464.json | 29 +++++++++++++++++++++++++++++ 2022/CVE-2022-33679.json | 4 ++-- 2022/CVE-2022-3602.json | 8 ++++---- 2022/CVE-2022-42889.json | 37 +++++++++++++++++++++++++++++++++++++ README.md | 24 +++++++++++++++++++++--- 39 files changed, 254 insertions(+), 139 deletions(-) diff --git a/1999/CVE-1999-1053.json b/1999/CVE-1999-1053.json index e0a8cd5cac..4678a43f7e 100644 --- a/1999/CVE-1999-1053.json +++ b/1999/CVE-1999-1053.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2022-11-21T12:02:42Z", "updated_at": "2022-11-21T12:04:08Z", - "pushed_at": "2022-11-21T12:04:04Z", + "pushed_at": "2022-11-21T12:41:06Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2010/CVE-2010-4804.json b/2010/CVE-2010-4804.json index 1e45683e0c..92264e060d 100644 --- a/2010/CVE-2010-4804.json +++ b/2010/CVE-2010-4804.json @@ -18,13 +18,13 @@ "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 6, "score": 0 } diff --git a/2015/CVE-2015-6639.json b/2015/CVE-2015-6639.json index 2bdef4cd92..85f30b4980 100644 --- a/2015/CVE-2015-6639.json +++ b/2015/CVE-2015-6639.json @@ -42,10 +42,10 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2022-11-18T07:29:12Z", + "updated_at": "2022-11-21T12:34:05Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 322, - "watchers_count": 322, + "stargazers_count": 323, + "watchers_count": 323, "has_discussions": false, "forks_count": 117, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 117, - "watchers": 322, + "watchers": 323, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-2431.json b/2016/CVE-2016-2431.json index 5f48d49690..508a90a9a1 100644 --- a/2016/CVE-2016-2431.json +++ b/2016/CVE-2016-2431.json @@ -42,10 +42,10 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2022-11-18T07:29:12Z", + "updated_at": "2022-11-21T12:34:05Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 322, - "watchers_count": 322, + "stargazers_count": 323, + "watchers_count": 323, "has_discussions": false, "forks_count": 117, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 117, - "watchers": 322, + "watchers": 323, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 538b4891f9..fe96e7e69f 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -255,10 +255,10 @@ "description": "A CVE-2016-5195 exploit example.", "fork": false, "created_at": "2016-10-23T00:16:33Z", - "updated_at": "2022-11-05T10:18:08Z", + "updated_at": "2022-11-21T14:40:17Z", "pushed_at": "2017-03-21T16:46:38Z", - "stargazers_count": 265, - "watchers_count": 265, + "stargazers_count": 266, + "watchers_count": 266, "has_discussions": false, "forks_count": 119, "allow_forking": true, @@ -271,7 +271,7 @@ ], "visibility": "public", "forks": 119, - "watchers": 265, + "watchers": 266, "score": 0 }, { diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index d1d10d9e6a..575e3db9af 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -459,10 +459,10 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2022-11-19T12:10:01Z", + "updated_at": "2022-11-21T14:44:13Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 365, - "watchers_count": 365, + "stargazers_count": 366, + "watchers_count": 366, "has_discussions": false, "forks_count": 116, "allow_forking": true, @@ -471,7 +471,7 @@ "topics": [], "visibility": "public", "forks": 116, - "watchers": 365, + "watchers": 366, "score": 0 }, { diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index 780f78150f..79f1dbcf50 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -1507,10 +1507,10 @@ "description": "Apache Struts 2.3.5 < 2.3.31 \/ 2.5 < 2.5.10 - Remote Code Execution - Shell Script", "fork": false, "created_at": "2018-05-13T16:13:26Z", - "updated_at": "2022-11-21T09:12:33Z", + "updated_at": "2022-11-21T17:30:11Z", "pushed_at": "2018-05-13T16:14:53Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -1519,7 +1519,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 9, + "watchers": 10, "score": 0 }, { diff --git a/2017/CVE-2017-9841.json b/2017/CVE-2017-9841.json index dac388ed1f..7dc2dfe1a7 100644 --- a/2017/CVE-2017-9841.json +++ b/2017/CVE-2017-9841.json @@ -337,5 +337,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 568897117, + "name": "CVE-2017-9841-", + "full_name": "Jhonsonwannaa\/CVE-2017-9841-", + "owner": { + "login": "Jhonsonwannaa", + "id": 114837630, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114837630?v=4", + "html_url": "https:\/\/github.com\/Jhonsonwannaa" + }, + "html_url": "https:\/\/github.com\/Jhonsonwannaa\/CVE-2017-9841-", + "description": null, + "fork": false, + "created_at": "2022-11-21T16:36:48Z", + "updated_at": "2022-11-21T16:37:26Z", + "pushed_at": "2022-11-21T16:37:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-8021.json b/2018/CVE-2018-8021.json index 6009000eb9..7c02ecb8a9 100644 --- a/2018/CVE-2018-8021.json +++ b/2018/CVE-2018-8021.json @@ -13,10 +13,10 @@ "description": "CVE-2018-8021 Proof-Of-Concept and Exploit ", "fork": false, "created_at": "2018-12-02T19:01:17Z", - "updated_at": "2022-08-08T22:31:25Z", + "updated_at": "2022-11-21T14:02:34Z", "pushed_at": "2018-12-03T21:13:00Z", - "stargazers_count": 105, - "watchers_count": 105, + "stargazers_count": 106, + "watchers_count": 106, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 105, + "watchers": 106, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-8897.json b/2018/CVE-2018-8897.json index bab1dab3b9..c2857410cc 100644 --- a/2018/CVE-2018-8897.json +++ b/2018/CVE-2018-8897.json @@ -71,7 +71,7 @@ "description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.", "fork": false, "created_at": "2018-05-13T19:34:17Z", - "updated_at": "2022-11-09T17:59:56Z", + "updated_at": "2022-11-21T13:18:02Z", "pushed_at": "2018-05-18T12:26:53Z", "stargazers_count": 405, "watchers_count": 405, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index a64f4a392a..5dd59bd25f 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -2935,10 +2935,10 @@ "description": "CVE-2019-0708 (BlueKeep)", "fork": false, "created_at": "2019-12-07T10:13:11Z", - "updated_at": "2022-11-15T17:39:53Z", + "updated_at": "2022-11-21T12:35:32Z", "pushed_at": "2020-07-07T15:28:13Z", - "stargazers_count": 99, - "watchers_count": 99, + "stargazers_count": 100, + "watchers_count": 100, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -2947,7 +2947,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 99, + "watchers": 100, "score": 0 }, { diff --git a/2019/CVE-2019-15126.json b/2019/CVE-2019-15126.json index 4cde6c6fc2..5785dd2f2a 100644 --- a/2019/CVE-2019-15126.json +++ b/2019/CVE-2019-15126.json @@ -42,10 +42,10 @@ "description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability", "fork": false, "created_at": "2020-03-13T14:53:54Z", - "updated_at": "2022-11-17T15:25:22Z", + "updated_at": "2022-11-21T12:28:18Z", "pushed_at": "2020-03-22T19:46:04Z", - "stargazers_count": 200, - "watchers_count": 200, + "stargazers_count": 201, + "watchers_count": 201, "has_discussions": false, "forks_count": 62, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 62, - "watchers": 200, + "watchers": 201, "score": 0 }, { diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index dc63bed70b..13cbc24a0d 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -13,10 +13,10 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2022-11-19T12:10:01Z", + "updated_at": "2022-11-21T14:44:13Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 365, - "watchers_count": 365, + "stargazers_count": 366, + "watchers_count": 366, "has_discussions": false, "forks_count": 116, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 116, - "watchers": 365, + "watchers": 366, "score": 0 }, { diff --git a/2020/CVE-2020-10558.json b/2020/CVE-2020-10558.json index ae6d0672c7..02c81a06e8 100644 --- a/2020/CVE-2020-10558.json +++ b/2020/CVE-2020-10558.json @@ -18,7 +18,7 @@ "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, - "forks_count": 3, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -33,7 +33,7 @@ "tesla" ], "visibility": "public", - "forks": 3, + "forks": 2, "watchers": 4, "score": 0 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 01ab601017..c2ab883027 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -47,13 +47,13 @@ "stargazers_count": 1517, "watchers_count": 1517, "has_discussions": false, - "forks_count": 350, + "forks_count": 349, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 350, + "forks": 349, "watchers": 1517, "score": 0 }, @@ -100,10 +100,10 @@ "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "fork": false, "created_at": "2020-09-14T16:56:51Z", - "updated_at": "2022-11-20T22:37:47Z", + "updated_at": "2022-11-21T15:18:44Z", "pushed_at": "2020-11-03T09:45:24Z", - "stargazers_count": 972, - "watchers_count": 972, + "stargazers_count": 973, + "watchers_count": 973, "has_discussions": false, "forks_count": 268, "allow_forking": true, @@ -112,7 +112,7 @@ "topics": [], "visibility": "public", "forks": 268, - "watchers": 972, + "watchers": 973, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index c477661139..848c261858 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -134,7 +134,7 @@ "stargazers_count": 995, "watchers_count": 995, "has_discussions": false, - "forks_count": 315, + "forks_count": 316, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -144,7 +144,7 @@ "poc" ], "visibility": "public", - "forks": 315, + "forks": 316, "watchers": 995, "score": 0 } diff --git a/2021/CVE-2021-1961.json b/2021/CVE-2021-1961.json index 7ce931ef57..80383eba86 100644 --- a/2021/CVE-2021-1961.json +++ b/2021/CVE-2021-1961.json @@ -13,10 +13,10 @@ "description": "Exploit code for CVE-2021-1961", "fork": false, "created_at": "2022-09-03T13:31:13Z", - "updated_at": "2022-11-16T07:24:31Z", + "updated_at": "2022-11-21T13:00:08Z", "pushed_at": "2022-09-07T11:47:56Z", - "stargazers_count": 80, - "watchers_count": 80, + "stargazers_count": 81, + "watchers_count": 81, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 80, + "watchers": 81, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json index dec33b351f..9299306b37 100644 --- a/2021/CVE-2021-21551.json +++ b/2021/CVE-2021-21551.json @@ -42,19 +42,19 @@ "description": null, "fork": false, "created_at": "2021-05-21T03:13:58Z", - "updated_at": "2022-11-14T03:33:07Z", + "updated_at": "2022-11-21T13:16:58Z", "pushed_at": "2021-05-21T03:24:25Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "has_discussions": false, - "forks_count": 3, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 13, + "forks": 5, + "watchers": 14, "score": 0 }, { @@ -100,10 +100,10 @@ "description": "arbitrary kernel read\/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority\/system", "fork": false, "created_at": "2021-05-30T10:15:10Z", - "updated_at": "2022-11-21T11:52:35Z", + "updated_at": "2022-11-21T17:03:46Z", "pushed_at": "2021-11-16T17:34:11Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -127,7 +127,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 31, + "watchers": 32, "score": 0 }, { diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 91667c9e9c..65b6542214 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -795,10 +795,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2022-11-21T09:40:10Z", + "updated_at": "2022-11-21T13:55:27Z", "pushed_at": "2022-10-28T14:26:56Z", - "stargazers_count": 629, - "watchers_count": 629, + "stargazers_count": 630, + "watchers_count": 630, "has_discussions": false, "forks_count": 68, "allow_forking": true, @@ -814,7 +814,7 @@ ], "visibility": "public", "forks": 68, - "watchers": 629, + "watchers": 630, "score": 0 }, { diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index 082e3879f4..913fb917af 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -71,10 +71,10 @@ "description": "GitLab CE\/EE Preauth RCE using ExifTool", "fork": false, "created_at": "2021-11-11T04:34:07Z", - "updated_at": "2022-11-09T18:14:22Z", + "updated_at": "2022-11-21T15:40:50Z", "pushed_at": "2022-01-16T15:54:14Z", - "stargazers_count": 156, - "watchers_count": 156, + "stargazers_count": 157, + "watchers_count": 157, "has_discussions": false, "forks_count": 33, "allow_forking": true, @@ -90,7 +90,7 @@ ], "visibility": "public", "forks": 33, - "watchers": 156, + "watchers": 157, "score": 0 }, { diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index cf73ff619c..31c7935b5c 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -134,7 +134,7 @@ "stargazers_count": 995, "watchers_count": 995, "has_discussions": false, - "forks_count": 315, + "forks_count": 316, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -144,7 +144,7 @@ "poc" ], "visibility": "public", - "forks": 315, + "forks": 316, "watchers": 995, "score": 0 }, diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index d2df8b1765..8a9e15cd4c 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -71,10 +71,10 @@ "description": "Detect webshells dropped on Microsoft Exchange servers exploited through \"proxylogon\" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)", "fork": false, "created_at": "2021-03-05T08:22:07Z", - "updated_at": "2022-09-06T16:33:10Z", + "updated_at": "2022-11-21T14:55:27Z", "pushed_at": "2021-03-16T08:34:14Z", - "stargazers_count": 96, - "watchers_count": 96, + "stargazers_count": 97, + "watchers_count": 97, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -90,7 +90,7 @@ ], "visibility": "public", "forks": 21, - "watchers": 96, + "watchers": 97, "score": 0 }, { diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index bbd01bc893..554751f211 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -18,13 +18,13 @@ "stargazers_count": 227, "watchers_count": 227, "has_discussions": false, - "forks_count": 66, + "forks_count": 65, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 66, + "forks": 65, "watchers": 227, "score": 0 }, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index e10d5a1dca..2c651b29ab 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1039,10 +1039,10 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2022-11-21T03:26:52Z", + "updated_at": "2022-11-21T12:35:26Z", "pushed_at": "2022-01-13T05:48:01Z", - "stargazers_count": 550, - "watchers_count": 550, + "stargazers_count": 551, + "watchers_count": 551, "has_discussions": false, "forks_count": 152, "allow_forking": true, @@ -1051,7 +1051,7 @@ "topics": [], "visibility": "public", "forks": 152, - "watchers": 550, + "watchers": 551, "score": 0 }, { diff --git a/2021/CVE-2021-36934.json b/2021/CVE-2021-36934.json index 9ffea59c4c..c0ab6d9b24 100644 --- a/2021/CVE-2021-36934.json +++ b/2021/CVE-2021-36934.json @@ -13,10 +13,10 @@ "description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation", "fork": false, "created_at": "2021-07-20T22:16:49Z", - "updated_at": "2022-11-11T02:29:04Z", + "updated_at": "2022-11-21T16:43:23Z", "pushed_at": "2022-01-16T02:09:46Z", - "stargazers_count": 191, - "watchers_count": 191, + "stargazers_count": 192, + "watchers_count": 192, "has_discussions": false, "forks_count": 37, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 37, - "watchers": 191, + "watchers": 192, "score": 0 }, { diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 7251849af4..bb10253fbb 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -409,10 +409,10 @@ "description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773", "fork": false, "created_at": "2022-03-12T21:24:55Z", - "updated_at": "2022-11-02T14:36:48Z", + "updated_at": "2022-11-21T15:34:17Z", "pushed_at": "2022-03-12T21:30:58Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 58, + "watchers_count": 58, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -430,7 +430,7 @@ ], "visibility": "public", "forks": 24, - "watchers": 57, + "watchers": 58, "score": 0 }, { @@ -1302,8 +1302,8 @@ "description": "Vulnerable configuration Apache HTTP Server version 2.4.49", "fork": false, "created_at": "2022-11-18T12:23:04Z", - "updated_at": "2022-11-21T09:02:13Z", - "pushed_at": "2022-11-18T18:04:17Z", + "updated_at": "2022-11-21T16:25:14Z", + "pushed_at": "2022-11-21T16:20:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -1315,6 +1315,7 @@ "apache", "cve", "cve-2021-41773", + "docker", "http-server", "lfi", "vulnerability" diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json index 0bd4c85773..128f6cbe54 100644 --- a/2021/CVE-2021-42013.json +++ b/2021/CVE-2021-42013.json @@ -470,8 +470,8 @@ "description": "Vulnerable configuration Apache HTTP Server version 2.4.49\/2.4.50", "fork": false, "created_at": "2022-11-18T17:53:46Z", - "updated_at": "2022-11-21T09:01:11Z", - "pushed_at": "2022-11-18T18:03:19Z", + "updated_at": "2022-11-21T17:11:21Z", + "pushed_at": "2022-11-21T17:10:49Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -483,6 +483,7 @@ "apache", "cve", "cve-2021-42013", + "docker", "http-server", "lfi", "rce", diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index bb01826de8..520e277a94 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -47,10 +47,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2022-11-17T07:44:37Z", + "updated_at": "2022-11-21T15:21:26Z", "pushed_at": "2022-09-01T21:30:25Z", - "stargazers_count": 471, - "watchers_count": 471, + "stargazers_count": 472, + "watchers_count": 472, "has_discussions": false, "forks_count": 92, "allow_forking": true, @@ -59,7 +59,7 @@ "topics": [], "visibility": "public", "forks": 92, - "watchers": 471, + "watchers": 472, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index d48db95809..2c407899c8 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -340,12 +340,12 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2022-11-21T09:16:10Z", + "updated_at": "2022-11-21T12:38:16Z", "pushed_at": "2022-09-21T07:49:03Z", - "stargazers_count": 1502, - "watchers_count": 1502, + "stargazers_count": 1503, + "watchers_count": 1503, "has_discussions": false, - "forks_count": 430, + "forks_count": 431, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -356,8 +356,8 @@ "security" ], "visibility": "public", - "forks": 430, - "watchers": 1502, + "forks": 431, + "watchers": 1503, "score": 0 }, { @@ -1178,19 +1178,19 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2022-11-18T06:11:50Z", + "updated_at": "2022-11-21T13:25:26Z", "pushed_at": "2022-10-20T15:37:44Z", - "stargazers_count": 3111, - "watchers_count": 3111, + "stargazers_count": 3112, + "watchers_count": 3112, "has_discussions": true, - "forks_count": 732, + "forks_count": 731, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 732, - "watchers": 3111, + "forks": 731, + "watchers": 3112, "score": 0 }, { diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index 2c7a19f6e6..fffaf1f078 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2022-11-21T11:01:10Z", + "updated_at": "2022-11-21T13:58:54Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 656, - "watchers_count": 656, + "stargazers_count": 657, + "watchers_count": 657, "has_discussions": false, "forks_count": 142, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 142, - "watchers": 656, + "watchers": 657, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 73aa685aa0..8bcb945174 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -712,10 +712,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2022-11-21T09:40:10Z", + "updated_at": "2022-11-21T13:55:27Z", "pushed_at": "2022-10-28T14:26:56Z", - "stargazers_count": 629, - "watchers_count": 629, + "stargazers_count": 630, + "watchers_count": 630, "has_discussions": false, "forks_count": 68, "allow_forking": true, @@ -731,7 +731,7 @@ ], "visibility": "public", "forks": 68, - "watchers": 629, + "watchers": 630, "score": 0 }, { diff --git a/2022/CVE-2022-24637.json b/2022/CVE-2022-24637.json index 05963dad55..4658fe6285 100644 --- a/2022/CVE-2022-24637.json +++ b/2022/CVE-2022-24637.json @@ -109,13 +109,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 2, "watchers": 1, "score": 0 } diff --git a/2022/CVE-2022-2588.json b/2022/CVE-2022-2588.json index abf6ccdade..c394620ded 100644 --- a/2022/CVE-2022-2588.json +++ b/2022/CVE-2022-2588.json @@ -13,10 +13,10 @@ "description": "exploit for CVE-2022-2588", "fork": false, "created_at": "2022-08-11T06:01:24Z", - "updated_at": "2022-11-18T20:17:01Z", + "updated_at": "2022-11-21T17:11:32Z", "pushed_at": "2022-10-27T16:35:08Z", - "stargazers_count": 371, - "watchers_count": 371, + "stargazers_count": 372, + "watchers_count": 372, "has_discussions": false, "forks_count": 50, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 50, - "watchers": 371, + "watchers": 372, "score": 0 }, { diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 5e5fdea0ab..48fdd13078 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,10 +13,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2022-11-21T05:01:31Z", + "updated_at": "2022-11-21T14:10:20Z", "pushed_at": "2022-11-06T09:44:23Z", - "stargazers_count": 864, - "watchers_count": 864, + "stargazers_count": 865, + "watchers_count": 865, "has_discussions": true, "forks_count": 157, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 157, - "watchers": 864, + "watchers": 865, "score": 0 }, { diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index b17ce1486a..e8c3ca56a0 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -643,5 +643,34 @@ "forks": 1, "watchers": 4, "score": 0 + }, + { + "id": 568830815, + "name": "CVE-2022-29464-", + "full_name": "Jhonsonwannaa\/CVE-2022-29464-", + "owner": { + "login": "Jhonsonwannaa", + "id": 114837630, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114837630?v=4", + "html_url": "https:\/\/github.com\/Jhonsonwannaa" + }, + "html_url": "https:\/\/github.com\/Jhonsonwannaa\/CVE-2022-29464-", + "description": null, + "fork": false, + "created_at": "2022-11-21T13:57:53Z", + "updated_at": "2022-11-21T13:58:32Z", + "pushed_at": "2022-11-21T13:58:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-33679.json b/2022/CVE-2022-33679.json index 7cc2c7299b..9f4c8fc46d 100644 --- a/2022/CVE-2022-33679.json +++ b/2022/CVE-2022-33679.json @@ -18,13 +18,13 @@ "stargazers_count": 306, "watchers_count": 306, "has_discussions": false, - "forks_count": 51, + "forks_count": 52, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 51, + "forks": 52, "watchers": 306, "score": 0 }, diff --git a/2022/CVE-2022-3602.json b/2022/CVE-2022-3602.json index 7fdd1a0f6c..4968556147 100644 --- a/2022/CVE-2022-3602.json +++ b/2022/CVE-2022-3602.json @@ -13,10 +13,10 @@ "description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3", "fork": false, "created_at": "2022-10-28T09:51:41Z", - "updated_at": "2022-11-20T12:51:08Z", + "updated_at": "2022-11-21T15:27:11Z", "pushed_at": "2022-11-18T15:47:17Z", - "stargazers_count": 527, - "watchers_count": 527, + "stargazers_count": 528, + "watchers_count": 528, "has_discussions": false, "forks_count": 115, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 115, - "watchers": 527, + "watchers": 528, "score": 0 }, { diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json index 50101b1403..df5b2b251f 100644 --- a/2022/CVE-2022-42889.json +++ b/2022/CVE-2022-42889.json @@ -935,5 +935,42 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 568929458, + "name": "Text4shell-exploit", + "full_name": "pwnb0y\/Text4shell-exploit", + "owner": { + "login": "pwnb0y", + "id": 96813659, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96813659?v=4", + "html_url": "https:\/\/github.com\/pwnb0y" + }, + "html_url": "https:\/\/github.com\/pwnb0y\/Text4shell-exploit", + "description": "Python Script to exploit RCE of CVE-2022-42889 ", + "fork": false, + "created_at": "2022-11-21T18:01:28Z", + "updated_at": "2022-11-21T18:21:17Z", + "pushed_at": "2022-11-21T18:17:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "apache-common-text", + "cve-2022-42889", + "cve-2022-42889-expliot", + "java-vulnerability", + "rce", + "text4shell", + "text4shell-exploit" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 6ad5773723..e680527331 100644 --- a/README.md +++ b/README.md @@ -2827,6 +2827,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code - [Blackyguy/-CVE-2022-29464](https://github.com/Blackyguy/-CVE-2022-29464) - [hupe1980/CVE-2022-29464](https://github.com/hupe1980/CVE-2022-29464) - [gbrsh/CVE-2022-29464](https://github.com/gbrsh/CVE-2022-29464) +- [Jhonsonwannaa/CVE-2022-29464-](https://github.com/Jhonsonwannaa/CVE-2022-29464-) ### CVE-2022-29548 (2022-04-20) @@ -4148,7 +4149,12 @@ OpenKM 6.3.11 allows stored XSS related to the javascript&colon; substring i - [izdiwho/CVE-2022-40317](https://github.com/izdiwho/CVE-2022-40317) -### CVE-2022-40470 +### CVE-2022-40470 (2022-11-21) + + +Phpgurukul Blood Donor Management System 1.0 allows Cross Site Scripting via Add Blood Group Name Feature. + + - [RashidKhanPathan/CVE-2022-40470](https://github.com/RashidKhanPathan/CVE-2022-40470) ### CVE-2022-40471 (2022-10-31) @@ -4343,6 +4349,7 @@ Apache Commons Text performs variable interpolation, allowing properties to be d - [sunnyvale-it/CVE-2022-42889-PoC](https://github.com/sunnyvale-it/CVE-2022-42889-PoC) - [QAInsights/cve-2022-42889-jmeter](https://github.com/QAInsights/cve-2022-42889-jmeter) - [adarshpv9746/Text4shell--Automated-exploit---CVE-2022-42889](https://github.com/adarshpv9746/Text4shell--Automated-exploit---CVE-2022-42889) +- [pwnb0y/Text4shell-exploit](https://github.com/pwnb0y/Text4shell-exploit) ### CVE-2022-42899 (2022-10-12) @@ -4360,7 +4367,12 @@ Mediatrix 4102 before v48.5.2718 allows local attackers to gain root access via - [ProxyStaffy/Mediatrix-CVE-2022-43096](https://github.com/ProxyStaffy/Mediatrix-CVE-2022-43096) -### CVE-2022-43117 +### CVE-2022-43117 (2022-11-21) + + +Sourcecodester Password Storage Application in PHP/OOP and MySQL 1.0 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities via the Name, Username, Description and Site Feature parameters. + + - [RashidKhanPathan/CVE-2022-43117](https://github.com/RashidKhanPathan/CVE-2022-43117) ### CVE-2022-43144 (2022-11-08) @@ -4382,7 +4394,12 @@ A cross-site scripting (XSS) vulnerability in Wondercms v3.3.4 allows attackers ### CVE-2022-43959 - [secware-ru/CVE-2022-43959](https://github.com/secware-ru/CVE-2022-43959) -### CVE-2022-44830 +### CVE-2022-44830 (2022-11-21) + + +Sourcecodester Event Registration App v1.0 was discovered to contain multiple CSV injection vulnerabilities via the First Name, Contact and Remarks fields. These vulnerabilities allow attackers to execute arbitrary code via a crafted excel file. + + - [RashidKhanPathan/CVE-2022-44830](https://github.com/RashidKhanPathan/CVE-2022-44830) @@ -23462,6 +23479,7 @@ Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows rem - [Invertebr4do/cve-2017-9841](https://github.com/Invertebr4do/cve-2017-9841) - [yoloskr/CVE-2017-9841-Scan](https://github.com/yoloskr/CVE-2017-9841-Scan) - [mileticluka1/eval-stdin](https://github.com/mileticluka1/eval-stdin) +- [Jhonsonwannaa/CVE-2017-9841-](https://github.com/Jhonsonwannaa/CVE-2017-9841-) ### CVE-2017-9934 (2017-07-17)